LEADER 05707nam 22008655 450 001 9910483817703321 005 20251226202227.0 010 $a3-540-89641-4 024 7 $a10.1007/978-3-540-89641-8 035 $a(CKB)1000000000545792 035 $a(SSID)ssj0000317076 035 $a(PQKBManifestationID)11274466 035 $a(PQKBTitleCode)TC0000317076 035 $a(PQKBWorkID)10287191 035 $a(PQKB)10644743 035 $a(DE-He213)978-3-540-89641-8 035 $a(MiAaPQ)EBC3063758 035 $a(MiAaPQ)EBC6283456 035 $a(PPN)132861526 035 $a(EXLCZ)991000000000545792 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security $e7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings /$fedited by Matthew Franklin, Lucas Chi-Kwong Hui, Duncan S. Wong 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XIII, 395 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5339 300 $aInternational conference proceedings. 311 08$a3-540-89640-6 320 $aIncludes bibliographical references and author index. 327 $aCryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård Is CCA1-Secure under the DDH Assumption -- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption -- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits -- Signatures -- Efficient and Short Certificateless Signature -- Sanitizable Signatures Revisited -- An Efficient On-Line/Off-Line Signature Scheme without Random Oracles -- On the Security of Online/Offline Signatures and Multisignatures from ACISP?06 -- Identification, Authentication and Key Management -- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks -- Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange -- Cryptanalysis of EC-RAC, a RFID Identification Protocol -- Cryptographic Algorithms and Protocols -- Counting Method for Multi-party Computation over Non-abelian Groups -- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups -- Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes -- Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols -- Skew Frobenius Map and Efficient Scalar Multiplication for Pairing?Based Cryptography -- Stream Ciphers and Block Ciphers -- Cryptanalysis of MV3 Stream Cipher -- 3D: A Three-Dimensional Block Cipher -- Cryptographic Foundations -- Construction of Resilient Functions with Multiple Cryptographic Criteria -- Enumeration of Homogeneous Rotation Symmetric Functions over F p -- Unconditionally Reliable Message Transmission in Directed Hypergraphs -- Applications and Implementations -- An Open Framework for Remote Electronic Elections -- Conditional Payments forComputing Markets -- High-Speed Search System for PGP Passphrases -- Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks -- Security in Ad Hoc Networks and Wireless Sensor Networks -- Authenticated Directed Diffusion -- A New Message Recognition Protocol for Ad Hoc Pervasive Networks. 330 $aThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008. The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on cryptosystems, signatures, identification, authentication and key management, cryptographic algorithms and protocols, stream ciphers and block ciphers, cryptographic foundations, applications and implementations, as well as security in ad hoc networks and wireless sensor networks. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5339 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aAlgorithms 606 $aCryptology 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aIT Operations 606 $aComputers and Society 606 $aAlgorithms 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aAlgorithms. 676 $a005.8 702 $aFranklin$b Matthew$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHui$b Lucas Chi-Kwong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWong$b Duncan S$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Cryptology and Network Security. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483817703321 996 $aCryptology and Network Security$92968064 997 $aUNINA